Skip to main content

Practical Experiences of Z and SSADM

  • Conference paper
Book cover Z User Workshop, London 1992

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

This paper describes an industrial approach to the use of formal and structured methods. It investigates the extent to which formal and structured methods may be integrated, in both technical and methodological terms. The conclusions presented are based on practical experiences in the development of secure systems products.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NCC. SSADM Version 4 Reference Manual. NCC, 1990

    Google Scholar 

  2. Randell G. Data Flow Diagrams and Z. Z User Workshop 1990, Springer-Verlag 1990

    Google Scholar 

  3. Semmens L, Allen P. Using Yourdon and Z: an Approach to Formal Specification. In: Nicholls JE (ed) Z User Workshop 1990. Springer-Verlag 1990

    Google Scholar 

  4. Polack F, Whiston M, Hitchcock P. Structured Analysis - A Draft Method for Writing Z Specifications. In: Nicholls JE (ed) Z User Workshop 1991. Springer-Verlag 1991

    Google Scholar 

  5. DoD. DoD Trusted Computer System Evaluation Criteria (Orange Book)

    Google Scholar 

  6. CESG. UK Systems Confidence Levels, CESG Computer Security Memorandum No. 3

    Google Scholar 

  7. EC. Information Technology Security Evaluation Criteria (ITSEC). EC 1991, ISBN 92–826–3004–8

    Google Scholar 

  8. Smith P, Keighley R. The Formal Development of a Secure Transaction Mechanism. In: Prehn S, Toetenel WJ (eds) VDM ‘81. Springer-Verlag, LNCS 551

    Google Scholar 

  9. Goguen J, Meseguer J. Security Policies and Security Models. Procs IEEE Symposium on Computer Security and Privacy, 1982

    Google Scholar 

  10. Arthan RD. Formal Specification of a Proof Tool. In: Prehn S, Toetenel WJ (eds) VDM ‘81. Springer-Verlag, LNCS 551

    Google Scholar 

  11. Jones RB. Methods and Tools for the Verification of Critical Properties. In: Morris JM, Shaw RC (eds) Procs. 5th Refinement Workshop. Springer-Verlag 1992

    Google Scholar 

  12. Kemmerer RA. Integrating Formal Methods into the Development Process. IEEE Software, Sept. 1990

    Google Scholar 

  13. Interim Defence Standard 00–55, The Procurement of Safety-Critical Software in Defence Equipment. April 1991

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Draper, C. (1993). Practical Experiences of Z and SSADM. In: Bowen, J.P., Nicholls, J.E. (eds) Z User Workshop, London 1992. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3556-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3556-2_16

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19818-5

  • Online ISBN: 978-1-4471-3556-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics